Page 38 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 38

the owner, or someone the owner provides the key   custody as well as forms of custody – that is allowing
            to, for example, an exchange.                      the assets to be placed on a DLT.  251
               The evolving debate amongst regulators is wheth-
            er having control of private keys on behalf of clients   Mitigation and Recommendations:
            is the equivalent to custody/safekeeping services,    While requiring a third party private key management
                                                         244
            and if so, whether the existing requirements should   function – that is custodial solutions offered by third
            apply to the providers of those services.          parties for user keys - is contradictory and possibly
                                               245
               There are significant hurdles to overcome if tradi-  even nugatory to the core ‘disintermediation’ prin-
            tional custody banks are to engage with this emerg-  ciples of DLTs. In all, these trade-offs may arguably
            ing asset class, including operating models, tech-  reduce the  utility  of  DLTs.  MPC-based  custodians
            nology, risk, compliance, and legal and regulatory   may however, as noted above, provide some utility in
            frameworks.                                        securing wallet value through distributing keys.
                       246
               This concentration of holding private keys of users,   From a crypto-asset perspective (that is native cryp-
            makes crypto-exchanges platforms a single point of   to), there needs to be a consensus by regulators of
            failure where clients have made these exchanges a   what constitutes safekeeping services.  One view
                                                                                                  252
            honeypot for hackers. The  amount  of stolen cryp-  is that having control of private keys on behalf of
            to-currency from exchanges in 2018 has increased 13   clients is the same as safekeeping services and that
            times compared to 2017, reportedly USD 2.7 million   rules to ensure the safekeeping and segregation of
            in crypto assets stolen every day, or USD 1,860 each   client assets should thus apply to the providers of
            minute.                                            those services. Multi-signature wallets, where sever-
                   247
               The exchanges are usually FinTechs, with poor   al private keys held by different individuals instead
            operational security commensurate with the levels of   of one are needed for a transaction to happen, will
            assets they are meant to have custody of. Simply, any   also require consideration.  There may be a need to
                                                                                      253
            regulated (legacy) instruction with such poor levels   consider some ‘technical’ changes to some require-
            of security would have been sanctioned or liquidated   ments and/or to provide clarity on how to interpret
            by regulators.                                     them, as they may not be adapted to DLT technolo-
                                                               gy.
                                                                 254
            Risks:
            Poor Security of Custodians and Customer Wallets:   8.5.3   Issue:  Poor End User Account
            A risk issue is whether the custodial they have the   Management and Awareness
            necessary measures in place to segregate assets and   Irresponsible and inadequate management of access
            safeguard them from hacks. Regulations in most of   and authorization information is a common and tradi-
            the world are silent on this type of custodial element,   tional challenge. In the case of blockchain systems,
            as private key custody is largely not yet codified as   this includes the storage and security of private keys,
            imputing possession and custody. Custodial solu-   token addresses and account passwords (such as
            tions for tokenized assets are  being  launched by   with third party services.) The methods which bad
            existing licensed financial service companies where   actors  use  to  gain  unauthorized  access  through
            the regulations allow this. In an example of the util-  stolen credentials is typically not specific to DLTs
            ity of an enabling bespoke crypto-asset regulatory   and can be applied generally to digital and connect-
            framework, the Swiss stock exchange SIX to develop   ed services.
            a trading platform for tokenized assets with a fully
            integrated trading, settlement, and custody infra-  Risks:
            structure.  The Swiss investment bank Vontobel     Failure to adequately manage keys can lead to
                     248
            launched the Digital Asset Vault to provide trading   permanent loss or theft of funds
            and custodial solutions to banks and asset manag-  Failure to adequately manage these items can
            ers. 249                                           lead to permanent loss or theft of funds and some
               The potential for use of DLTs for securities and   specific repercussions with regard to public block-
            derivatives could increase investor control, improve   chains, where no centralized authority is available
            the efficiency of systemic risk distribution, and cre-  to provide remedies, such as providing a user with a
            ate a more diverse and resilient financial ecosys-  lost address, lost private key or reversing a transac-
            tem.  The use of DLT for these purposes however    tion to a dead wallet. The concept of ‘irreversibility’
                250
            still needs to be mandated, in particular what defines   of transactions is fundamental to DLT principles. Use
                                                               of wallets or exchanges may also be comprised if the



           36    Security Aspects of Distributed Ledger Technologies
   33   34   35   36   37   38   39   40   41   42   43